US6810013B1 - Path optimization in packet-based telecommunication network - Google Patents

Path optimization in packet-based telecommunication network Download PDF

Info

Publication number
US6810013B1
US6810013B1 US09/402,885 US40288599A US6810013B1 US 6810013 B1 US6810013 B1 US 6810013B1 US 40288599 A US40288599 A US 40288599A US 6810013 B1 US6810013 B1 US 6810013B1
Authority
US
United States
Prior art keywords
network
network node
loop
packet
special packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/402,885
Inventor
Kristian Rauhala
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Corp
Nokia USA Inc
Original Assignee
Nokia Networks Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Networks Oy filed Critical Nokia Networks Oy
Assigned to NOKIA NETWORKS OY reassignment NOKIA NETWORKS OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAUHALA, KRISTIAN
Application granted granted Critical
Publication of US6810013B1 publication Critical patent/US6810013B1/en
Assigned to NOKIA CORPORATION reassignment NOKIA CORPORATION MERGER (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA NETWORKS OY
Assigned to NOKIA TECHNOLOGIES OY reassignment NOKIA TECHNOLOGIES OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA CORPORATION
Assigned to NOKIA CORPORATION reassignment NOKIA CORPORATION MERGER (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA NETWORKS OY
Assigned to NOKIA USA INC. reassignment NOKIA USA INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP LLC
Assigned to CORTLAND CAPITAL MARKET SERVICES, LLC reassignment CORTLAND CAPITAL MARKET SERVICES, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP, LLC
Assigned to PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT SAS, NOKIA SOLUTIONS AND NETWORKS BV, NOKIA TECHNOLOGIES OY
Anticipated expiration legal-status Critical
Assigned to NOKIA US HOLDINGS INC. reassignment NOKIA US HOLDINGS INC. ASSIGNMENT AND ASSUMPTION AGREEMENT Assignors: NOKIA USA INC.
Assigned to PROVENANCE ASSET GROUP LLC, PROVENANCE ASSET GROUP HOLDINGS LLC reassignment PROVENANCE ASSET GROUP LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA US HOLDINGS INC.
Assigned to PROVENANCE ASSET GROUP LLC, PROVENANCE ASSET GROUP HOLDINGS LLC reassignment PROVENANCE ASSET GROUP LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CORTLAND CAPITAL MARKETS SERVICES LLC
Assigned to RPX CORPORATION reassignment RPX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP LLC
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • H04Q11/0428Integrated services digital network, i.e. systems for transmission of different types of digitised signals, e.g. speech, data, telecentral, television signals
    • H04Q11/0478Provisions for broadband connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/34Modification of an existing route
    • H04W40/36Modification of an existing route due to handover
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5603Access techniques
    • H04L2012/5604Medium of transmission, e.g. fibre, cable, radio
    • H04L2012/5607Radio
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5619Network Node Interface, e.g. tandem connections, transit switching
    • H04L2012/562Routing

Definitions

  • the invention relates to connection-oriented packet-based telecommunication networks, such as ATM (Asynchronous Transfer Mode), and particularly to route optimization in such networks.
  • ATM Asynchronous Transfer Mode
  • B-ISDN Broadband Integrated Services Digital Networks
  • ATM Asynchronous Transfer Mode
  • the ATM is a switching and multiplexing solution, particularly relating to a data link layer (i.e. OSI Layer 2 , from here on called the ATM layer).
  • OSI Layer 2 a data link layer
  • ATM enables an implementation of a connection-oriented packet network in the B-ISDN networks
  • ATM data transmission the end user's data traffic is carried from a source to a destination by virtual connections. Data is transferred over switches of the network in standard-size packets of 53 bytes, the packets being called ATM cells.
  • the structure of an ATM cell is illustrated in FIG. 1 .
  • An ATM cell contains a header of 5 octets and an information field of 48 octets containing actual payload.
  • the main object of the header is to identify a connection number for a cell sequence forming a virtual channel to a particular call.
  • a physical layer i.e. OSI Layer 1
  • VPI Virtual Path Identifier
  • Each virtual path may comprise a number of virtual channels that are identified by a VCI (Virtual Channel Identifier).
  • the header contains also other fields, such as an HEC (Header Error Control), a GFC (Generic Flow Control), a CLP (Cell Loss Priority) and a PT (Payload Type).
  • HEC Header Error Control
  • GFC Generic Flow Control
  • CLP Cell Loss Priority
  • PT Payment Type
  • the ATM cell contains indirectly the information on the receiver's address, each cell thus being an independent data transfer unit. The number of cells transferred in a time unit is proportional to the user's bandwidth requirements.
  • the ATM is a connection-oriented traffic technique, but because there is no connection before it is established, a connection establishment request shall be routed from a source through the ATM network to a destination approximately in the same way as packets are routed in packet switched network works. After the connection has been established the cells travel along the same virtual path during the connection.
  • a third development trend is to introduce wireless data transmission (wireless ATM) and mobility into the ATM networks (wireless ATM).
  • wireless ATM wireless data transmission
  • the present B-ISDN and ATM standards do not support as such the additional features required by wireless communication, but different solutions to implement for example mobility management in connection with wireless ATM have already been presented.
  • the aim has been to add wireless data transmission and mobility to the ATM network without significant changes in the existing ATM standards and networks.
  • Such solutions have been presented in the applicant's copending Finnish patent applications 971178 and 970602, for example.
  • PLMNs Public Land Mobile Network
  • the transmission systems of mobile networks have conventionally been implemented by circuit-switched connections in a star or tree network configuration.
  • the use of different broadband packet-switched transmission systems or ATM technique in mobile networks has also been proposed, for example in WO 9400959, EP 0366342 and EP 0426269.
  • a possible future development trend is mobile systems having a broadband radio interface. Then a broadband transmission system of the mobile system is also needed, while a potential alternative is ATM technique.
  • a terminal In mobile networks and in a wireless ATM network a terminal does not have any fixed access point to the network, but the terminal and the access point may move in the network.
  • the routing When a virtual connection has been routed to the terminal through the ATM network, the routing must also be changed or extended from an old access point (a base station, for example) to a new one. This procedure is called handover or handoff.
  • handover In a hard handover, the data transmission is interrupted when the connection is connected from one access point to another.
  • a soft handover the continuation of the data transmission is secured by the terminal having a connection both with the old and the new AP (Access Point) simultaneously during handover.
  • Non-optimal routing refers to a situation in which the virtual connection is not routed directly from one point to another, but the connection travels a longer winding path which is determined according to handover. In the worst case, the virtual connection path has a loop, which starts from and ends at the same network node. Unnecessary loops on the connection path cause delay and use network resources, which is why they should be avoided.
  • the following simple example illustrates how a routing loop could be produced in a wireless ATM network.
  • Two base stations BTS 1 and BTS 2 have been connected to an ATM switch 20 .
  • BTS 1 and BTS 2 are also equipped with ATM switching functions. Let us first assume that a mobile station MS has a radio connection with the base station BTS 1 and a virtual ATM connection between the base station BTS 1 and port 2 of the ATM switch 20 . Inside the ATM switch port 2 is connected to port 1 from which a virtual connection has been established (through the ATM network) to a second party. Next, a so-called path extension (PE) handover is performed from the base station. BTS 1 to base station BTS 2 . Let us assume in the example case that there is no direct ATM link between the base stations.
  • PE path extension
  • BTS 1 first routes the connection back to port 3 of the ATM switch 20 from where it is routed through port 4 to the base station BTS 2 .
  • the result is a non-optimal routing, when the connection path has a loop from the switch 20 to the base station BTS 1 and back.
  • An optimal routing would require bypassing the loop by connecting the connection directly from port 1 to port 4 . Similar loops can be produced in any part of the ATM network.
  • a global identifier which is transferred in the ATM cells, is used for the connection and the loops can be detected by this identifier. If the network node detects that the same global identifier appears at two output ports, it may conclude that the matter referred to is a loop that should be removed. However, in cases where a global identifier is not available, it is difficult to detect that a loop exists. Furthermore, when the loop has been detected, the optimal connection path should be switched in such a manner that transferable cells do not disappear or that their order does not change.
  • An object of the invention is thus to develop a method and an equipment implementing the method so that said problems will be solved.
  • the objects of the invention are achieved with a method for optimizing a connection path in a packet-based telecommunication network in which an access point of a terminal to the network and thereby the routing of a connection path can change during connection.
  • the method is characterized by
  • the invention further relates to an arrangement to optimize a connection path in a packet-based telecommunication network in which an access point of a terminal to the network can change during connection.
  • the arrangement is characterized by at least one network node along the connection path comprising
  • the invention is based on using a special packet for detecting non-optimal routing or a loop, which special packet any network node on the path can add to the packet flow.
  • the network node provides this special packet with a unique code which the network node uses locally for identifying the special packet and for linking the special packet to a particular established connection.
  • the network node adding a special packet to the packet flow must be able to identify the unique code and special packet. If there is a loop on the path, the special packet added to the packet flow returns back to the same network node.
  • the network node detects that a special packet provided with a particular code returns back, it may conclude that on the connection path, to which the unique code is linked, there is a loop that should be removed. Then the network node can internally switch to an optimal route bypassing the detected loop. Furthermore, the network node preferably releases the loop in a way characteristic of the network.
  • the elimination of a detected loop is based on the use of the special packet.
  • the network node sends a second special packet provided with a unique identifier to the same connection having the loop.
  • the network node starts to buffer possible incoming packets which are meant to be sent to the connection containing the loop.
  • the packets arriving from the loop are normally transmitted forward.
  • the loop is “flushed” i.e. all packets sent to the loop before the second special packet and the start of the buffering have returned back and been transmitted forward. Now the network node can bypass the loop by internally switching the connection to an optimal route.
  • the network node When the loop has been bypassed, the network node sends to the optimized path the buffered packets which have arrived after the transmission of the second packet.
  • the order of the packets can be preserved during the elimination of the loop and the optimization of the path.
  • An advantage with the invention is that the loop is removed using the network node's local and internal function which can be implemented without significant changes in the existing switches.
  • the intermediate nodes along the connection can insert special packets to the packet flow, for example, operation and maintenance cells in the ATM network.
  • the special packet according to the invention is only locally significant, i.e. only the network node adding the special packet to the packet flow has to be able to identify the special packet and to interpret the contents of the special packet.
  • the invention enables the operation without a global connection identifier.
  • Detection and elimination of the loop may be started locally always when the network node is able to suspect that a loop exists, for example, after the network procedures which may cause the formation of a loop in the network in addition or alternatively the network node may start to detect or eliminate the loop regularly or randomly. This is possible since the loop as such is not a failure situation barring appropriate data transmission, but is non-optimally utilizing the network resources. For this reason the optimization of the path can be performed normally without particular haste, although it is preferable to detect and eliminate the loop as early as possible.
  • FIG. 1 shows the structure of an ATM cell
  • FIG. 2 illustrates the part of a wireless ATM network and a formation of a loop for a connection path as a result of handover
  • FIG. 3 is a flow chart illustrating an identification of a loop according to the invention in the network node
  • FIG. 4 is a flow chart illustrating an elimination of a loop according to the invention in the network node.
  • the present invention is applicable to be used in all connection-oriented packet-based telecommunication networks in which, loops can be formed for a connection path.
  • the invention is particularly applicable to be used in connection-oriented packet-based telecommunication networks in which the access point of a terminal to the network changes as a result of the mobility of the terminal when the connection is active.
  • Such telecommunication networks are, for example, wireless packet networks and mobile networks in which the connection-oriented packet network is used as a transmission network between base stations and controlling elements.
  • the primary application area of the invention is ATM networks particularly wireless ATM networks and mobile networks, in the transmission networks of which ATM technique is used.
  • FIG. 2 it is assumed that as a result of PE handover the situation formed as described above in which an active virtual ATM connection is routed to port 1 of an ATM switch 20 , connected from port 1 to port inside the ATM switch 20 , routed from port 2 to a base station BTS 1 , routed from the base station BTS 1 back to the switch 20 to port 3 , connected from port 3 to port 4 inside the switch 20 , and routed from port 4 to a base station BTS 2 .
  • BTS 2 communicates over the radio path with a mobile station MS.
  • the ATM switch 20 receives cell flow to port 1 , the cell flow containing, for example, ATM cells according to FIG. 1 .
  • the switch 20 transmits the cell flow along the path described above to the base station BTS 2 which sends information in the downlink direction to the mobile station (as ATM cells or in any other form). In the opposite uplink direction the ATM cell flow can travel along the same route.
  • the switch 20 knows that PE-handover is being performed (for example based on the signalling associated with handover) and starts a procedure according to the invention to check whether a loop that could be eliminated has been formed for the connection path in connection with handover.
  • the switch 20 can randomly or regularly check whether connections travelling through it contain loops.
  • the switch 20 allocates to the connection which is to be checked a unique identifier code which is inserted in the special packet (step 30 ).
  • the switch 20 uses the identifier code locally for identifying the special packet and for binding the special packet to a particular formed connection.
  • the identifier code can be a code of any form applicable to the purpose. Different ATM switches may even use different type of codes.
  • the special packet may, for example, be an ATM operation and maintenance cell indicated by a PT (Payload type) of the cell. Then the PT value is 100 or 101. For this purpose a new special cell may also be defined, and the special cell may be given, for example, the PT value 110 or 111 which is yet undefined.
  • the identifier code may be located in the information field of the cell.
  • the type of the special packet, the way it is identified and the way by which an allocated identifier code is located in it are not significant for the invention.
  • the invention only requires that the switch 20 is able to identify the special packet it has sent and to link it to a particular ATM connection.
  • the routing or address information of the packet such as at least a VCI (Virtual Channel Identifier) in the ATM cell, have to be the same as the ones in the user packet flow transferred over the connection.
  • a special packet sent by a switch 10 is routed in the same way as the actual packet flow of the end user.
  • a VCI (Virtual Channel Identifier) of the ATM cell does not necessarily have to be the same as in the user cells, since the special packets (such as OAM cells typically) may use a different virtual channel on the same path.
  • the switch 20 sends the special packet from an output port 2 towards the base station BTS 1 and starts a control timer, step 31 . Then the switch 20 checks if the special packet has been received at any input port of the switch 20 , step 32 . If the special packet has not been received it is checked whether the control timer has expired, step 33 . Time measured by the control timer is a period of time exceeding the maximum transmission delay in the network, i.e. the maximum time that the special packet would need for the possible loop to pass. If the control timer has expired in step 33 , it can be assumed that there is no loop on the path and the waiting for the special packet can be stopped. Then the identifier code allocated to the connection is released, step 35 , and the identifying procedure of the loop is completed.
  • step 33 the procedure returns to step 32 .
  • the special packet travels through the base station BTS 1 back to the switch 20 to port 3 .
  • the switch 20 concludes that the ATM connection indicated by the identifier included in the special packet has a loop between ports 2 and 3 , step 34 .
  • the switch 20 starts a path optimization procedure, step 36 , and completes the detection procedure of the loop.
  • the flow chart in FIG. 4 illustrates an example of the optimization procedure of the invention also based on the use of the special packet.
  • the switch 20 sends a second special packet equipped with a unique identifier to the same connection where the loop is, i.e. from port 2 to the base station BTS 1 .
  • the switch 20 starts to buffer the packets which possibly arrive at port 1 using the connection containing the loop.
  • the switch 20 continues to transmit the packets arriving at port 3 from the loop (the base station BTS 1 ) normally forward to port 4 and to the base station BTS 2 , step 41 .
  • step 42 it is checked whether the special packet has returned from the loop to port 3 . If not, the procedure returns to step 41 .
  • the loop is “flushed”, i.e. all packets sent to the loop before the second special packet and the start of the buffering have returned back and been transmitted forwards.
  • the switch 20 bypasses the loop by internally switching the connection directly from port 1 to port 4 , step 43 .
  • the switch 20 sends all packets buffered after step 40 through port 4 to the base station BTS 2 , step 44 .
  • the switch 20 starts transmitting the normal packet flow directly from port 1 to port 4 , step 45 .
  • the loop has been eliminated and at the same time the packet order has been preserved and the optimization procedure can be completed.
  • the above described switch 20 may be any network element provided with an ATM switching function, such as a conventional ATM network switch, a wireless ATM network switch, another telecommunication network element equipped with an ATM switching function.
  • a conventional ATM network switch such as a conventional ATM network switch, a wireless ATM network switch, another telecommunication network element equipped with an ATM switching function.
  • Implementation examples of the wireless ATM network and a mobile network using ATM technique have been described, for example, in the Finnish patent applications 971178 and 970602 which are incorporated herein as references.

Abstract

The invention relates to connection-oriented packet-based telecommunication networks such as ATM (Asynchronous Transfer Mode) and particularly to route optimization in such networks. A network node (20) on the route adds to a packet flow a special packet comprising a unique code which the network node (20) locally uses for identifying the special packet and for associating the special packet to a particular formed connection. If there is a loop on the path (2,BTS1,3) the special packet added to the packet flow returns back to the same network node. When the network node detects that the special packet provided with the unique code returns back, it may conclude that on the path of the connection to which the unique code is associated to, there is a loop that should be eliminated. Thereafter the network node may internally switch an optimal path (1,4,BTS2) bypassing the detected loop (2,BTS1,3). Furthermore, the network node preferably releases the loop in a manner characteristic of the network. According to a preferred embodiment of the invention also the elimination of the detected loop is based on the use of the special packet.

Description

This application is the national phase of international application PCT/FI98/00323 filed Apr. 9, 1998 which designated the U.S.
FIELD OF THE INVENTION
The invention relates to connection-oriented packet-based telecommunication networks, such as ATM (Asynchronous Transfer Mode), and particularly to route optimization in such networks.
BACKGROUND OF THE INVENTION
At present, there are two very interesting development trends in telecommunication: mobile communications and broadband networks in which bit rates typically exceed 2 Mbit/s. An example of broadband networks is Broadband Integrated Services Digital Networks.(B-ISDN), the transfer mode of which is selected to be Asynchronous Transfer Mode (ATM). The ATM is a switching and multiplexing solution, particularly relating to a data link layer (i.e. OSI Layer 2, from here on called the ATM layer). ATM enables an implementation of a connection-oriented packet network in the B-ISDN networks,
In ATM data transmission-the end user's data traffic is carried from a source to a destination by virtual connections. Data is transferred over switches of the network in standard-size packets of 53 bytes, the packets being called ATM cells. The structure of an ATM cell is illustrated in FIG. 1. An ATM cell contains a header of 5 octets and an information field of 48 octets containing actual payload. The main object of the header is to identify a connection number for a cell sequence forming a virtual channel to a particular call. A physical layer (i.e. OSI Layer 1 ) may comprise several virtual paths which are multiplexed in the ATM layer. The virtual paths are identified by a VPI (Virtual Path Identifier). Each virtual path may comprise a number of virtual channels that are identified by a VCI (Virtual Channel Identifier). The header contains also other fields, such as an HEC (Header Error Control), a GFC (Generic Flow Control), a CLP (Cell Loss Priority) and a PT (Payload Type). The ATM cell contains indirectly the information on the receiver's address, each cell thus being an independent data transfer unit. The number of cells transferred in a time unit is proportional to the user's bandwidth requirements.
The ATM is a connection-oriented traffic technique, but because there is no connection before it is established, a connection establishment request shall be routed from a source through the ATM network to a destination approximately in the same way as packets are routed in packet switched network works. After the connection has been established the cells travel along the same virtual path during the connection.
A third development trend is to introduce wireless data transmission (wireless ATM) and mobility into the ATM networks (wireless ATM). The present B-ISDN and ATM standards do not support as such the additional features required by wireless communication, but different solutions to implement for example mobility management in connection with wireless ATM have already been presented. The aim has been to add wireless data transmission and mobility to the ATM network without significant changes in the existing ATM standards and networks. Such solutions have been presented in the applicant's copending Finnish patent applications 971178 and 970602, for example.
In PLMNs (Public Land Mobile Network) radio interfaces have conventionally been narrowband interfaces. The transmission systems of mobile networks have conventionally been implemented by circuit-switched connections in a star or tree network configuration. In order to increase the capacity and flexibility of the transmission systems, the use of different broadband packet-switched transmission systems or ATM technique in mobile networks has also been proposed, for example in WO 9400959, EP 0366342 and EP 0426269. A possible future development trend is mobile systems having a broadband radio interface. Then a broadband transmission system of the mobile system is also needed, while a potential alternative is ATM technique.
In mobile networks and in a wireless ATM network a terminal does not have any fixed access point to the network, but the terminal and the access point may move in the network. When a virtual connection has been routed to the terminal through the ATM network, the routing must also be changed or extended from an old access point (a base station, for example) to a new one. This procedure is called handover or handoff. In a hard handover, the data transmission is interrupted when the connection is connected from one access point to another. In a soft handover the continuation of the data transmission is secured by the terminal having a connection both with the old and the new AP (Access Point) simultaneously during handover.
Handover and particularly several consecutive handovers can lead to non-optimal routing of a virtual connection. Non-optimal routing refers to a situation in which the virtual connection is not routed directly from one point to another, but the connection travels a longer winding path which is determined according to handover. In the worst case, the virtual connection path has a loop, which starts from and ends at the same network node. Unnecessary loops on the connection path cause delay and use network resources, which is why they should be avoided.
The following simple example illustrates how a routing loop could be produced in a wireless ATM network. Two base stations BTS1 and BTS2 have been connected to an ATM switch 20. BTS1 and BTS2 are also equipped with ATM switching functions. Let us first assume that a mobile station MS has a radio connection with the base station BTS1 and a virtual ATM connection between the base station BTS1 and port 2 of the ATM switch 20. Inside the ATM switch port 2 is connected to port 1 from which a virtual connection has been established (through the ATM network) to a second party. Next, a so-called path extension (PE) handover is performed from the base station. BTS1 to base station BTS2. Let us assume in the example case that there is no direct ATM link between the base stations. Then BTS1 first routes the connection back to port 3 of the ATM switch 20 from where it is routed through port 4 to the base station BTS2. The result is a non-optimal routing, when the connection path has a loop from the switch 20 to the base station BTS1 and back. An optimal routing would require bypassing the loop by connecting the connection directly from port 1 to port 4. Similar loops can be produced in any part of the ATM network.
In order to be able to remove the above described loops, they should first be detected. In the ATM networks a global identifier, which is transferred in the ATM cells, is used for the connection and the loops can be detected by this identifier. If the network node detects that the same global identifier appears at two output ports, it may conclude that the matter referred to is a loop that should be removed. However, in cases where a global identifier is not available, it is difficult to detect that a loop exists. Furthermore, when the loop has been detected, the optimal connection path should be switched in such a manner that transferable cells do not disappear or that their order does not change.
SUMMARY OF THE INVENTION
An object of the invention is thus to develop a method and an equipment implementing the method so that said problems will be solved.
The objects of the invention are achieved with a method for optimizing a connection path in a packet-based telecommunication network in which an access point of a terminal to the network and thereby the routing of a connection path can change during connection. The method is characterized by
adding a special packet to an end-to-end packet flow in a network node along the connection path, said network node being able to locally identify said special packet,
detecting the looping of the connection path back to said network node if said special packet later returns to said network node,
optimizing the connection path by switching the connection path to bypass a loop inside said network node.
The invention further relates to an arrangement to optimize a connection path in a packet-based telecommunication network in which an access point of a terminal to the network can change during connection. The arrangement is characterized by at least one network node along the connection path comprising
means for adding to an end-to-end packet flow travelling on a connection path a special packet comprising an identifier by which said network node identifies the connection locally,
means for monitoring whether said special packet will later return back to said network node and for thereby detecting the looping of the connection path back to said network node,
means for switching the connection inside said network node to a more optimal path bypassing said detected loop.
The invention is based on using a special packet for detecting non-optimal routing or a loop, which special packet any network node on the path can add to the packet flow. The network node provides this special packet with a unique code which the network node uses locally for identifying the special packet and for linking the special packet to a particular established connection. In other words, according to the invention only the network node adding a special packet to the packet flow must be able to identify the unique code and special packet. If there is a loop on the path, the special packet added to the packet flow returns back to the same network node. When the network node detects that a special packet provided with a particular code returns back, it may conclude that on the connection path, to which the unique code is linked, there is a loop that should be removed. Then the network node can internally switch to an optimal route bypassing the detected loop. Furthermore, the network node preferably releases the loop in a way characteristic of the network.
According to a preferred embodiment of the invention also the elimination of a detected loop is based on the use of the special packet. When the network node has detected the loop, the network node sends a second special packet provided with a unique identifier to the same connection having the loop. At the same time the network node starts to buffer possible incoming packets which are meant to be sent to the connection containing the loop. The packets arriving from the loop are normally transmitted forward. When the second special packet reappears from the loop to the network node that sent it, then the loop is “flushed” i.e. all packets sent to the loop before the second special packet and the start of the buffering have returned back and been transmitted forward. Now the network node can bypass the loop by internally switching the connection to an optimal route. When the loop has been bypassed, the network node sends to the optimized path the buffered packets which have arrived after the transmission of the second packet. Using the flushing and buffering based on the special packet of the invention the order of the packets can be preserved during the elimination of the loop and the optimization of the path.
An advantage with the invention is that the loop is removed using the network node's local and internal function which can be implemented without significant changes in the existing switches. In packet-based networks the intermediate nodes along the connection can insert special packets to the packet flow, for example, operation and maintenance cells in the ATM network. The special packet according to the invention is only locally significant, i.e. only the network node adding the special packet to the packet flow has to be able to identify the special packet and to interpret the contents of the special packet. Thus the invention enables the operation without a global connection identifier. Detection and elimination of the loop may be started locally always when the network node is able to suspect that a loop exists, for example, after the network procedures which may cause the formation of a loop in the network in addition or alternatively the network node may start to detect or eliminate the loop regularly or randomly. This is possible since the loop as such is not a failure situation barring appropriate data transmission, but is non-optimally utilizing the network resources. For this reason the optimization of the path can be performed normally without particular haste, although it is preferable to detect and eliminate the loop as early as possible.
BRIEF DESCRIPTION OF THE DRAWINGS
In the following the invention will be described in greater detail in connection with the preferred embodiments with reference to the accompanying drawings, in which:
FIG. 1 shows the structure of an ATM cell,
FIG. 2 illustrates the part of a wireless ATM network and a formation of a loop for a connection path as a result of handover,
FIG. 3 is a flow chart illustrating an identification of a loop according to the invention in the network node,
FIG. 4 is a flow chart illustrating an elimination of a loop according to the invention in the network node.
DETAILED DESCRIPTION OF THE INVENTION
The present invention is applicable to be used in all connection-oriented packet-based telecommunication networks in which, loops can be formed for a connection path. The invention is particularly applicable to be used in connection-oriented packet-based telecommunication networks in which the access point of a terminal to the network changes as a result of the mobility of the terminal when the connection is active. Such telecommunication networks are, for example, wireless packet networks and mobile networks in which the connection-oriented packet network is used as a transmission network between base stations and controlling elements. The primary application area of the invention is ATM networks particularly wireless ATM networks and mobile networks, in the transmission networks of which ATM technique is used.
In the following the primary preferred embodiment of the invention is described in connection with the wireless ATM network with reference to FIGS. 1-4.
With reference to FIG. 2 it is assumed that as a result of PE handover the situation formed as described above in which an active virtual ATM connection is routed to port 1 of an ATM switch 20, connected from port 1 to port inside the ATM switch 20, routed from port 2 to a base station BTS1, routed from the base station BTS1 back to the switch 20 to port 3, connected from port 3 to port 4 inside the switch 20, and routed from port 4 to a base station BTS2. BTS2 communicates over the radio path with a mobile station MS. Let us further assume that the ATM switch 20 receives cell flow to port 1, the cell flow containing, for example, ATM cells according to FIG. 1. The switch 20 transmits the cell flow along the path described above to the base station BTS2 which sends information in the downlink direction to the mobile station (as ATM cells or in any other form). In the opposite uplink direction the ATM cell flow can travel along the same route.
The switch 20 knows that PE-handover is being performed (for example based on the signalling associated with handover) and starts a procedure according to the invention to check whether a loop that could be eliminated has been formed for the connection path in connection with handover. Alternatively the switch 20 can randomly or regularly check whether connections travelling through it contain loops.
With reference to FIG. 3 the switch 20 allocates to the connection which is to be checked a unique identifier code which is inserted in the special packet (step 30). The switch 20 uses the identifier code locally for identifying the special packet and for binding the special packet to a particular formed connection. The identifier code can be a code of any form applicable to the purpose. Different ATM switches may even use different type of codes. The special packet may, for example, be an ATM operation and maintenance cell indicated by a PT (Payload type) of the cell. Then the PT value is 100 or 101. For this purpose a new special cell may also be defined, and the special cell may be given, for example, the PT value 110 or 111 which is yet undefined. The identifier code may be located in the information field of the cell. It should, however, be noted that the type of the special packet, the way it is identified and the way by which an allocated identifier code is located in it are not significant for the invention. The invention only requires that the switch 20 is able to identify the special packet it has sent and to link it to a particular ATM connection. Thus, the routing or address information of the packet, such as at least a VCI (Virtual Channel Identifier) in the ATM cell, have to be the same as the ones in the user packet flow transferred over the connection. Thus, a special packet sent by a switch 10 is routed in the same way as the actual packet flow of the end user. A VCI (Virtual Channel Identifier) of the ATM cell does not necessarily have to be the same as in the user cells, since the special packets (such as OAM cells typically) may use a different virtual channel on the same path.
The switch 20 sends the special packet from an output port 2 towards the base station BTS1 and starts a control timer, step 31. Then the switch 20 checks if the special packet has been received at any input port of the switch 20, step 32. If the special packet has not been received it is checked whether the control timer has expired, step 33. Time measured by the control timer is a period of time exceeding the maximum transmission delay in the network, i.e. the maximum time that the special packet would need for the possible loop to pass. If the control timer has expired in step 33, it can be assumed that there is no loop on the path and the waiting for the special packet can be stopped. Then the identifier code allocated to the connection is released, step 35, and the identifying procedure of the loop is completed.
If the control timer has not expired in step 33, the procedure returns to step 32. In the example in FIG. 2 the special packet travels through the base station BTS1 back to the switch 20 to port 3. When it is detected in step 32 that the special packet has been received to the input port 3, the switch 20 concludes that the ATM connection indicated by the identifier included in the special packet has a loop between ports 2 and 3, step 34. Then the switch 20 starts a path optimization procedure, step 36, and completes the detection procedure of the loop.
The flow chart in FIG. 4 illustrates an example of the optimization procedure of the invention also based on the use of the special packet. First in step 40 the switch 20 sends a second special packet equipped with a unique identifier to the same connection where the loop is, i.e. from port 2 to the base station BTS1. Simultaneously the switch 20 starts to buffer the packets which possibly arrive at port 1 using the connection containing the loop. The switch 20 continues to transmit the packets arriving at port 3 from the loop (the base station BTS1) normally forward to port 4 and to the base station BTS2, step 41. In step 42 it is checked whether the special packet has returned from the loop to port 3. If not, the procedure returns to step 41. When the second special packet reappears from the loop to the switch 20 to port 3, the loop is “flushed”, i.e. all packets sent to the loop before the second special packet and the start of the buffering have returned back and been transmitted forwards. Now the switch 20 bypasses the loop by internally switching the connection directly from port 1 to port 4, step 43. When the loop has been bypassed the switch 20 sends all packets buffered after step 40 through port 4 to the base station BTS2, step 44. Then the switch 20 starts transmitting the normal packet flow directly from port 1 to port 4, step 45. Thus, the loop has been eliminated and at the same time the packet order has been preserved and the optimization procedure can be completed.
The above described switch 20 may be any network element provided with an ATM switching function, such as a conventional ATM network switch, a wireless ATM network switch, another telecommunication network element equipped with an ATM switching function. Implementation examples of the wireless ATM network and a mobile network using ATM technique have been described, for example, in the Finnish patent applications 971178 and 970602 which are incorporated herein as references.
The Figures and the description associated with them are only meant to illustrate the present invention. The invention and the preferred embodiments of the invention are thus not restricted to the above described examples but can vary within the scope of the claims.

Claims (22)

What claimed is:
1. A method for optimizing a connection path in a packet-based telecommunication network in which an access point of a terminal to the network and thereby routing of a connection path can change during connection, comprising:
adding a special packet to an end-to-end packet flow in a network node along the connection path;
providing said special packet with a unique code that enables said network node to locally identify said special packet and said connection;
detecting looping of the connection path back to said network node by said network node in response to a special packet including the unique code provided by said network node later returning to said network node; and
optimizing the connection path in response to detected looping of the connection path by switching the connection path to bypass a the detected loop inside said network node.
2. A method as claimed in claim 1, wherein said optimizing comprises:
starting buffering of end-to-end packets which are to be sent to the loop in said network node;
sending from said network node to the loop a second special packet which the network node is able to locally identify;
receiving said second special packet from the loop to said network node;
switching the connection path to bypass said loop inside said network node; and
sending buffered end-to-end packets from said network node onwards to the optimized connection path while preserving packet order.
3. A method as claimed in claim 1, further comprising:
adding said special packet to the end-to-end packet flow regularly, randomly or after a network procedure, which may cause a formation of the loop in the network.
4. A method as claimed in claim 3, wherein said network procedure includes a handover procedure to hand over the terminal in the network from one network access point to another.
5. A method as claimed in claim 1, further comprising adding said special packet to the end-to-end packet flow regularly, randomly or after a network procedure, which may cause a formation of the loop in the network, and said network procedure comprises a handover procedure for handing over a mobile station from one base station to another.
6. A method as claimed in claim 1, wherein said special packet is an ATM operation or maintenance cell.
7. A method for optimizing a connection path in a packet-based telecommunication network in which an access point of a terminal to the network and thereby routing of a connection path can change during connection, comprising:
adding a special packet to an end-to-end packet flow in a network node along the connection path;
providing said special packet with a unique code that enables said network node to locally identify said special packet and said connection;
detecting looping of the connection path back to said network node by said network node in response to a special packet including the unique code provided by said network node later returning to said network node; and
optimizing the connection path in response to detected looping of the connection path by switching the connection path to bypass the detected loop inside said network node, wherein the telecommunication network is an ATM based mobile network comprising mobile stations, base stations, at least one controlling mobile network element and an ATM transmission network connecting said controlling mobile network element and the base stations, said network node is said controlling mobile network element and/or an ATM switch and/or a base station of the ATM transmission network, and the packet are ATM cells.
8. A method as claimed in claim 7, wherein said optimizing comprises:
starting buffering of end-to-end packets which are to be sent to the loop in said network node;
sending from said network node to the loop a second special packet which the network node is able to locally identify;
receiving said second special packet from the loop to said network node;
switching the connection path to bypass said loop inside said network node; and
sending buffered end-to-end packets from said network node onwards to the optimized connection path while preserving packet order.
9. A method as claimed in claim 7, further comprising:
adding said special packet to the end-to-end packet flow regularly, randomly or after a network procedure, which may cause a formation of the loop in the network.
10. A method as claimed in claim 9, wherein said network procedure includes a handover procedure to hand over the terminal in the network from one network access point to another.
11. A method as claimed in claim 7, further comprising adding said special packet to the end-to-end packet flow regularly, randomly or after a network procedure, which may cause a formation of the loop in the network, and said network procedure comprises a handover procedure for handing over a mobile station from one base station to another.
12. A method as claimed in claim 7, wherein said special packet is an ATM operation or maintenance cell.
13. An arrangement to optimize a connection path in a packet-based telecommunication network in which an access point of a terminal to the network can change during connection, wherein at least one network node along the connection path comprises:
means for adding to an end-to-end packet flow travelling on the connection path a special packet including a unique code that enables said network node to locally identify said special packet and said connection;
means for monitoring whether said special packet comprising the unique code provided by said network node later returns back to said network node and for thereby detecting a loop and/or looping of the connection path back to said network node; and
means for switching the connection inside said network node to a more optimal path bypassing said detected loop/wherein the telecommunication network is a wireless ATM network comprising mobile stations and at least one ATM switch to which base stations are connected, said network node is an ATM switch and/or a base station, and the packets are ATM cells.
14. An arrangement as claimed in claim 13, wherein said switching means comprises:
means for sending a second special packet comprising an identifier from said network node to said loop;
means for receiving said second special packet from the loop to said network node;
means for switching the connection path to bypass said loop inside said network node in response to receiving the second special packet; and
buffer means responsive to the detection of the loop and/or sending said second special packet for initiation to buffer end-to-end packets which are to be sent to the loop in said network node and for sending, after switching the optimized connection path, the buffered packets from said network node onwards to the optimized connection path while preserving the packet order.
15. An arrangement as claimed in claim 13 wherein said network node is arranged to add the special packet to the end-to-end packet flow regularly, randomly or after a network procedure which may cause formation of the loop in the network.
16. An arrangement as claimed in claim 15, wherein said network procedure comprises a handover procedure to hand over a mobile station in the network from one network access point to another.
17. An arrangement as claimed in claim 10, wherein said network node is arranged to add the special packet to the end-to-end packet flow regularly, randomly or after a network procedure which may cause the formation of the loop in the network, and said network procedure comprises a handover procedure to hand over a mobile station from one base station to another.
18. An arrangement to optimize a connection path in a packet-based telecommunication network in which an access point of a terminal to the network can change during connection, wherein at least one network node along the connection path comprises:
means for adding to an end-to-end packet flow travelling on the connection path a special packet including a unique code that enables said network node to locally identify said special packet and said connection;
means for monitoring whether said special packet comprising the unique code provided by said network node later returns back to said network node and for thereby detecting a loop and/or looping of the connection path back to said network node; and
means for switching the connection inside said network node to a more optimal path bypassing said detected loop, wherein the telecommunication network is an ATM-based mobile network comprising mobile stations, base stations, at least one controlling mobile network element and an ATM transmission network connecting said controlling mobile network element and the base stations, a said network node is said controlling mobile network element and/or an ATM switch and/or a base station of the ATM transmission network and the packets are ATM cells.
19. An arrangement as claimed in claim 18, wherein said switching means comprises:
means for sending a second special packet comprising an identifier from said network node to said loop;
means for receiving said second special packet from the loop to said network node;
means for switching the connection path to bypass said loop inside said network node in response to receiving the second special packet; and
buffer means responsive to the detection of the loop and/or sending said second special packet for initiation to buffer end-to-end packets which are to be sent to the loop in said network node and for sending, after switching the optimized connection path, the buffered packets from said network node onwards to the optimized connection path while preserving the packet order.
20. An arrangement as claimed in claim 18, wherein said network node is arranged to add the special packet to the end-to-end packet flow regularly, randomly or after a network procedure which may cause formation of the loop in the network.
21. An arrangement as claimed in claim 20, wherein said network procedure comprises a handover procedure to hand over a mobile station in the network from one network access point to another.
22. An arrangement as claimed in claim 18, wherein said network node is arranged to add the special packet to the end-to-end packet flow regularly, randomly or after a network procedure which may cause the formation of the loop in the network, and said network procedure comprises a handover procedure to hand over a mobile station from one base station to another.
US09/402,885 1997-04-15 1998-04-09 Path optimization in packet-based telecommunication network Expired - Lifetime US6810013B1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FI971586A FI109504B (en) 1997-04-15 1997-04-15 Route optimization in a packet-based telecommunications network
FI971586 1997-04-15
PCT/FI1998/000323 WO1998047301A2 (en) 1997-04-15 1998-04-09 Path optimization in packet-based telecommunication network

Publications (1)

Publication Number Publication Date
US6810013B1 true US6810013B1 (en) 2004-10-26

Family

ID=8548629

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/402,885 Expired - Lifetime US6810013B1 (en) 1997-04-15 1998-04-09 Path optimization in packet-based telecommunication network

Country Status (11)

Country Link
US (1) US6810013B1 (en)
EP (1) EP0976268B1 (en)
JP (1) JP2002501694A (en)
CN (1) CN1254485A (en)
AT (1) ATE269625T1 (en)
AU (1) AU6835598A (en)
CA (1) CA2287276A1 (en)
DE (1) DE69824568D1 (en)
FI (1) FI109504B (en)
WO (1) WO1998047301A2 (en)
ZA (1) ZA983092B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050010685A1 (en) * 2003-07-11 2005-01-13 Agency For Science, Technology And Research Method and a system for enabling data to be stored in a computer network; a method and a system for storing data in a computer network
US20060045091A1 (en) * 2004-08-31 2006-03-02 Fujitsu Limited Transmission device
US20070153742A1 (en) * 2006-01-03 2007-07-05 Benoist Sebire Method, apparatus, software, and system for handover
US7672228B1 (en) * 2003-03-19 2010-03-02 Extreme Networks, Inc. System and method for network loop detection and recovery
US20130254451A1 (en) * 2001-08-24 2013-09-26 Jasmin Ajanovic General input/output architecture, protocol and related methods to implement flow control
US20140304448A9 (en) * 2001-08-24 2014-10-09 Intel Corporation General input/output architecture, protocol and related methods to implement flow control

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100356185B1 (en) * 2000-08-31 2002-10-18 윈스로드 주식회사 Method for guaranteeing transmission service quality in internet
EP1402748A1 (en) * 2001-05-28 2004-03-31 Nokia Corporation Optimal routing when two or more network elements are integrated in one element
US7761165B1 (en) 2005-09-29 2010-07-20 Boston Scientific Neuromodulation Corporation Implantable stimulator with integrated plastic housing/metal contacts and manufacture and use
US7244150B1 (en) 2006-01-09 2007-07-17 Advanced Bionics Corporation Connector and methods of fabrication
US8224450B2 (en) 2006-09-18 2012-07-17 Boston Scientific Neuromodulation Corporation Feed through interconnect assembly for an implantable stimulation system and methods of making and using

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2265278A (en) 1992-03-21 1993-09-22 Roke Manor Research Radio infrastructure network
US5323394A (en) * 1992-04-07 1994-06-21 Digital Equipment Corporation Selecting optimal routes in source routing bridging without exponential flooding of explorer packets
US5331637A (en) * 1993-07-30 1994-07-19 Bell Communications Research, Inc. Multicast routing using core based trees
EP0616480A2 (en) 1993-03-17 1994-09-21 Roke Manor Research Limited Communication system for transmission between ATM network and mobile radio system
US5359600A (en) 1992-02-14 1994-10-25 Nippon Telegraph And Telephone Corporation High throughput supervisory system for ATM switching systems transporting STM-N signals
FI961038A (en) 1995-03-07 1996-09-08 Roke Manor Research Improvements in or near mobile networks
US5590126A (en) * 1995-09-27 1996-12-31 Lucent Technologies Inc. Method for call establishment and rerouting in mobile computing networks
US6058114A (en) * 1996-05-20 2000-05-02 Cisco Systems, Inc. Unified network cell scheduler and flow controller
US6580715B1 (en) * 1998-05-04 2003-06-17 Hewlett-Packard Development Company, L.P. Load balancing switch protocols

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5359600A (en) 1992-02-14 1994-10-25 Nippon Telegraph And Telephone Corporation High throughput supervisory system for ATM switching systems transporting STM-N signals
GB2265278A (en) 1992-03-21 1993-09-22 Roke Manor Research Radio infrastructure network
US5323394A (en) * 1992-04-07 1994-06-21 Digital Equipment Corporation Selecting optimal routes in source routing bridging without exponential flooding of explorer packets
EP0616480A2 (en) 1993-03-17 1994-09-21 Roke Manor Research Limited Communication system for transmission between ATM network and mobile radio system
US5331637A (en) * 1993-07-30 1994-07-19 Bell Communications Research, Inc. Multicast routing using core based trees
FI961038A (en) 1995-03-07 1996-09-08 Roke Manor Research Improvements in or near mobile networks
GB2298765A (en) 1995-03-07 1996-09-11 Roke Manor Research Improvements in mobile telecommunications networks using ATM
US5590126A (en) * 1995-09-27 1996-12-31 Lucent Technologies Inc. Method for call establishment and rerouting in mobile computing networks
US6058114A (en) * 1996-05-20 2000-05-02 Cisco Systems, Inc. Unified network cell scheduler and flow controller
US6580715B1 (en) * 1998-05-04 2003-06-17 Hewlett-Packard Development Company, L.P. Load balancing switch protocols

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8819306B2 (en) 2001-08-24 2014-08-26 Intel Corporation General input/output architecture with PCI express protocol with credit-based flow control
US9565106B2 (en) * 2001-08-24 2017-02-07 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US20140304448A9 (en) * 2001-08-24 2014-10-09 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US9049125B2 (en) 2001-08-24 2015-06-02 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US20130254451A1 (en) * 2001-08-24 2013-09-26 Jasmin Ajanovic General input/output architecture, protocol and related methods to implement flow control
US20140129747A1 (en) * 2001-08-24 2014-05-08 Jasmin Ajanovic General input/output architecture, protocol and related methods to implement flow control
US20140189174A1 (en) * 2001-08-24 2014-07-03 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US20140185436A1 (en) * 2001-08-24 2014-07-03 Jasmin Ajanovic General input/output architecture, protocol and related methods to implement flow control
US9860173B2 (en) * 2001-08-24 2018-01-02 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US9836424B2 (en) * 2001-08-24 2017-12-05 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US9736071B2 (en) 2001-08-24 2017-08-15 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US9071528B2 (en) * 2001-08-24 2015-06-30 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US9088495B2 (en) 2001-08-24 2015-07-21 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US9602408B2 (en) * 2001-08-24 2017-03-21 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US7672228B1 (en) * 2003-03-19 2010-03-02 Extreme Networks, Inc. System and method for network loop detection and recovery
US20050010685A1 (en) * 2003-07-11 2005-01-13 Agency For Science, Technology And Research Method and a system for enabling data to be stored in a computer network; a method and a system for storing data in a computer network
US20060045091A1 (en) * 2004-08-31 2006-03-02 Fujitsu Limited Transmission device
US20070153742A1 (en) * 2006-01-03 2007-07-05 Benoist Sebire Method, apparatus, software, and system for handover

Also Published As

Publication number Publication date
CN1254485A (en) 2000-05-24
AU6835598A (en) 1998-11-11
ZA983092B (en) 1998-10-20
EP0976268A2 (en) 2000-02-02
FI109504B (en) 2002-08-15
JP2002501694A (en) 2002-01-15
EP0976268B1 (en) 2004-06-16
FI971586A (en) 1998-10-16
FI971586A0 (en) 1997-04-15
WO1998047301A2 (en) 1998-10-22
CA2287276A1 (en) 1998-10-22
ATE269625T1 (en) 2004-07-15
DE69824568D1 (en) 2004-07-22
WO1998047301A3 (en) 1999-01-21

Similar Documents

Publication Publication Date Title
FI109503B (en) Prevention of packet loss during handover in a packet-based telecommunications network and handover procedure
US5959972A (en) Method of port/link redundancy in an ATM switch
KR100429187B1 (en) ATM Packet Network and Method for Transmitting Packet
JP3721078B2 (en) Flow control method in telecommunication system
FI98772C (en) Procedure for route switching on a packet data connection
FI113932B (en) Improvements to asynchronous transport mode networks for mobile communications
JP3143799B2 (en) Method for sending information over an integrated transmission network
US6810013B1 (en) Path optimization in packet-based telecommunication network
US6760335B1 (en) Dynamic AAL2 path configuration in ATM system
CN100375461C (en) Method for carrying out VPR protection inversion in network
US6944156B2 (en) Label request packet transmission method, packet transfer network and method thereof, and packet transfer device
US6882626B1 (en) System and method for automated switching of data traffic in a packet network
US6697370B1 (en) Bandwidth control method of packet data in packet switching network and packet switching network system
Yu et al. Connection architecture and protocols to support efficient handoffs over an ATM/B-ISDN personal communications network
EP0851701A2 (en) Hand-off control technique for wireless ATM network
EP0731620B1 (en) Handover in a mobile telecommunications network with ATM switch
US6636514B1 (en) Telecommunications system
JP2001511632A (en) Method for transmitting information using ATM cells and wireless communication system
JPH08186580A (en) Communication system
CA2286596A1 (en) Location management in a connection-oriented packet network
WO2001011825A2 (en) Communications using hybrid circuit-switched and packet-switched networks
Venieris et al. Bridging remote connectionless LAN/MANs through connection oriented ATM networks
EP1223779A2 (en) Hand-off control technique for wireless ATM
KR20020084517A (en) Method for Resource Assignment with Grouping of Destination using ATM Adaption Layer 2 Protocol
KR20100063584A (en) Method for providing abr service in mobile communication system and base station controller using the same

Legal Events

Date Code Title Description
AS Assignment

Owner name: NOKIA NETWORKS OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RAUHALA, KRISTIAN;REEL/FRAME:010474/0675

Effective date: 19991006

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: NOKIA CORPORATION, FINLAND

Free format text: MERGER;ASSIGNOR:NOKIA NETWORKS OY;REEL/FRAME:035789/0917

Effective date: 20070911

AS Assignment

Owner name: NOKIA TECHNOLOGIES OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:035796/0819

Effective date: 20150116

Owner name: NOKIA CORPORATION, FINLAND

Free format text: MERGER;ASSIGNOR:NOKIA NETWORKS OY;REEL/FRAME:035842/0359

Effective date: 20070911

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001

Effective date: 20170912

Owner name: NOKIA USA INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001

Effective date: 20170913

Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001

Effective date: 20170913

AS Assignment

Owner name: NOKIA US HOLDINGS INC., NEW JERSEY

Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682

Effective date: 20181220

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

AS Assignment

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001

Effective date: 20211129